Open this publication in new window or tab >>Show others...
2015 (English)In: Proceedings - International Computer Software and Applications ConferenceVolume 2,, 2015, p. 510-515Conference paper, Published paper (Refereed)
Abstract [en]
The security in industrial automation domain using cryptography mechansims is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key managment should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.
National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-29233 (URN)10.1109/COMPSAC.2015.61 (DOI)000380584300070 ()2-s2.0-84962148518 (Scopus ID)978-1-4673-6563-5 (ISBN)
Conference
The 39th Annual International Computers, Software & Applications Conference COMPSAC'15, 1-5 Jul 2015, Taichung, Taiwan
Projects
ITS-EASY Post Graduate School for Embedded Software and Systems
2015-10-062015-09-292017-05-29Bibliographically approved